Instructional Video6:06
Instructional Video6:40
Curated Video

JavaScript Mastery from Zero to Hero - Prepare for Coding Interviews - Solution - Declare a Variable in JavaScript and Log the Result

Higher Ed
In this video, we will discuss the solution to the exercise on declaring a variable in JavaScript and logging the result from the previous video. This clip is from the chapter "Introduction to Programming and JavaScript Basics for...
Instructional Video2:04
Curated Video

Data Science Model Deployments and Cloud Computing on GCP - Continuous Monitoring

Higher Ed
This video explains continuous monitoring, which is the process and technology used to detect compliance and risk issues associated with an operational environment. This clip is from the chapter "DevOps" of the series "Web Development...
Instructional Video4:51
Curated Video

Data Science Model Deployments and Cloud Computing on GCP - Lab - Pipeline Execution in Kubeflow

Higher Ed
In this lab video, you will learn to use the Kubeflow for pipeline execution. This clip is from the chapter "Vertex AI - Machine Learning Framework" of the series "Data Science Model Deployments and Cloud Computing on GCP".In this...
Instructional Video2:16
Curated Video

Data Science Model Deployments and Cloud Computing on GCP - Introduction

Higher Ed
This video provides an introduction to the section. This clip is from the chapter "Cloud Functions - Serverless and Event-Driven Applications" of the series "Data Science Model Deployments and Cloud Computing on GCP".In this section, you...
Instructional Video5:08
Curated Video

Vue.js 3 and Firebase for Beginners - Detecting Auth Changes

Higher Ed
This video explains how we can detectany auth changes using the useAuth file. This clip is from the chapter "Authentication" of the series "Vue.js 3 and Firebase for Beginners".This section is all about authentication and how to create...
Instructional Video4:06
Curated Video

Chatbots Development with Amazon Lex - Framework of Lex

Higher Ed
In this lecture, we will discuss the framework of Amazon Lex and how it functions. We will look at the operation cycle of the Amazon chatbot.
Instructional Video5:45
Instructional Video8:55
Curated Video

Fundamentals of Secure Software - API Security

Higher Ed
This video explains API security.
Instructional Video3:09
Curated Video

A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures Prevention

Higher Ed
This video explains the steps to prevent security logging and monitoring failures.
Instructional Video4:33
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - CloudWatch

Higher Ed
In earlier videos of this course, CloudWatch has been referenced. In this video, you will see what CloudWatch has to offer so that you can design for it well.
Instructional Video6:48
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Flow Logs

Higher Ed
If you need to log network traffic through your AWS solution, you should explore flow logs. Flow logs allow you to monitor network traffic and, with CloudWatch, receive alerts related to traffic conditions. This video introduces the...
Instructional Video11:47
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - CloudTrail

Higher Ed
When you have IAM users, groups, roles, and policies defined, it's time to think about how you will track or log everything that's going on in AWS. In this video, you will learn about AWS CloudTrail and how it can help you monitor and...
Instructional Video5:14
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Users and Super Users

Higher Ed
This video explains users and super users. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware concerns as a PC...
Instructional Video6:51
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Advanced Windows Startup Options

Higher Ed
Advanced Startup Options was the go-to tool before WinRE, providing many features (such as Safe mode) that helped techs fix Windows systems. Advanced Startup Options live on in WinRE, so it's important for techs to know how to access and...
Instructional Video10:50
Curated Video

Learn Azure Serverless Functions in a Weekend - Creating First Function in Azure Portal

Higher Ed
This video helps you with creating your first function in Azure Portal. This clip is from the chapter "Creating Azure Functions in Azure Portal" of the series "Learn Azure Serverless Functions in a Weekend".This section focuses on...
Instructional Video7:48
Curated Video

Learn Azure Serverless Functions in a Weekend - Binding Expression and Function Monitoring

Higher Ed
This video explains binding expression and function monitoring in detail. This clip is from the chapter "Azure Functions Integrations – Enhancing the Function Code" of the series "Learn Azure Serverless Functions in a Weekend".This...
Instructional Video11:03
Curated Video

PowerShell for Automating Administration - Code Changes to be able to execute Scripts Centrally

Higher Ed
In this video, you will see what changes we can make in our application and system validation scripts to be able to put the scripts on a remote server; and we never have to login into the remote server at all, be it for executing the...
Instructional Video12:49
Curated Video

CISSP Crash Course - Conducting Logging and Monitoring Activities

Higher Ed
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Instructional Video3:07
Curated Video

CISSP Crash Course - Understand and Comply with Investigations

Higher Ed
This video explains evidence collection, forensics, and handling investigations. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video4:43
Curated Video

HashiCorp Certified - Vault Associate Course - Audit Devices

Higher Ed
In this video, we will explore the concept of audit devices in HashiCorp Vault, which are responsible for recording and storing audit logs of Vault operations. This video will help you better understand what audit devices are and how to...
Instructional Video4:06
Curated Video

Chatbots for Beginners: A Complete Guide to Build Chatbots - Fundamentals of AWS for Chatbots: Framework of Lex

Higher Ed
In this lecture, we will discuss the framework of Amazon Lex and how it functions. We will look at the operation cycle of the Amazon chatbot. This clip is from the chapter "Chatbots Development with Amazon Lex" of the series "Chatbots...
Instructional Video8:50
Curated Video

Getting Started with HashiCorp Nomad - Monitoring the Nomad Environment

Higher Ed
In this lesson, we will examine how to monitor the Nomad environment. We will discuss the multiple integrated options for monitoring, runtime metrics, information collection, telemetry data, and more. This clip is from the chapter...
Instructional Video6:21
Curated Video

Getting Started with HashiCorp Nomad - Demo - Rotating the Gossip Encryption Key

Higher Ed
In this demonstration, we will practically work on rotating the gossip encryption key. You will learn to generate a new gossip key. You will learn to install the key, create a list of keys, instruct Nomad to use the new key, and replace...